CVE-2019-25459

Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in the endpoint that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into parameters like emlak_durumu, emlak_tipi, il, ilce, kelime, and semt to extract sensitive database information or perform time-based blind SQL injection attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:web-ofisi:emlak:2.0.0:*:*:*:*:*:*:*

History

02 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.2
v2 : unknown
v3 : 9.8

26 Feb 2026, 20:14

Type Values Removed Values Added
First Time Web-ofisi emlak
Web-ofisi
CPE cpe:2.3:a:web-ofisi:emlak:2.0.0:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/47142 - () https://www.exploit-db.com/exploits/47142 - Exploit
References () https://www.vulncheck.com/advisories/web-ofisi-emlak-sql-injection-via-emlak-arahtml - () https://www.vulncheck.com/advisories/web-ofisi-emlak-sql-injection-via-emlak-arahtml - Broken Link
References () https://www.web-ofisi.com/detay/emlak-scripti-v3.html - () https://www.web-ofisi.com/detay/emlak-scripti-v3.html - Product

23 Feb 2026, 18:13

Type Values Removed Values Added
Summary
  • (es) Web Ofisi Emlak V2 contiene múltiples vulnerabilidades de inyección SQL en el endpoint que permiten a atacantes no autenticados manipular consultas a la base de datos a través de parámetros GET. Los atacantes pueden inyectar código SQL en parámetros como emlak_durumu, emlak_tipi, il, ilce, kelime y semt para extraer información sensible de la base de datos o realizar ataques de inyección SQL ciega basada en tiempo.

22 Feb 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-22 15:16

Updated : 2026-03-02 15:16


NVD link : CVE-2019-25459

Mitre link : CVE-2019-25459

CVE.ORG link : CVE-2019-25459


JSON object : View

Products Affected

web-ofisi

  • emlak
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')